The edition configuration (EI.cfg) file and the product ID (PID.txt) file are optional configuration files that you can use to specify the Windows? product key and the Windows edition during Windows installation. You can use these files to automate the product-key entry page in Windows Setup instead of using an answer file. If you use an EI.cfg file to differentiate volume license media, but you do not include a PID.txt file, the user receives a prompt for a product key to continue Windows Setup.

You can reuse the product key in the product ID file for multiple installations. The product key in the product ID file is only used to install Windows. This key is not used to activate Windows.

Question No: 32 DRAG DROP – (Topic 1)

A computer currently runs a 64-bit version of Windows 7 Enterprise.

You need to deploy a 64-bit version of Windows 8.1 Pro to the computer. The new deployment must not affect the Windows 7 installation on the computer.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

When it comes to dual-booting between Windows 8 and Windows 7, the advice is the same as always: Install the older OS first, make room for the second OS, and then install the newer OS.

Once Windows 7 is installed on the PC, there are two steps to follow to install Windows 8 in a dual-boot configuration:

Partition the disk.

Install Windows 8 using the Custom install type. Now, you can run Windows 8 Setup. You can use optical disc- or USB-based Setup media, but you must do so by booting the PC from the media. (That is, do not run Setup from within Windows 7.)

Step through the Windows 8 Setup wizard normally. When you reach the screen that asks, “Which type of installation do you want?”, Choose “Custom: Install Windows only (advanced).”

Question No: 33 DRAG DROP – (Topic 1)

A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Some computers have a Trusted Platform Module (TPM) chip. Members of the ITStaff security group are part of the local Power Users group on each client computer.

You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers by using the least amount of privilege necessary.

Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

To use Group Policy, your organization must be using Active Directory, and the destination desktop and server computers must be running Windows Server 2008, Windows Vista, Windows Server 2003, or Windows XP.

By default, only members of the Domain Admins or the Enterprise Admins groups can create and link GPOs, but you can delegate this task to other users.

This policy setting is used to control which unlock options are available for operating system drives.

With this policy setting, you can configure whether BitLocker requires additional authentication each time the computer starts and whether you are using BitLocker with a Trusted Platform Module (TPM). This policy setting is applied when you turn on BitLocker.

Reference

If you want to use BitLocker on a computer without a TPM, select the Allow BitLocker without a compatible TPM check box. In this mode, a USB drive is required for startup. Key

information that is used to encrypt the drive is stored on the USB drive, which creates a USB key. When the USB key is inserted, access to the drive is authenticated and the drive is accessible. If the USB key is lost or unavailable, you need to use one of the BitLocker recovery options to access the drive.

Further information:

Enforce drive encryption type on fixed data drives

This policy controls whether fixed data drives utilize Used Space Only encryption or Full encryption. Setting this policy also causes the BitLocker Setup Wizard to skip the encryption options page so no encryption selection displays to the user.

Question No: 34 – (Topic 1)

You administer Windows 8.1 client computers in your company network.

You receive a virtual hard disk (VHD) file that has Windows 8.1 Pro preinstalled, along with several business applications.

You need to configure your client computer to start from either the VHD file or from your current operating system.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

This section describes how to create a bootable VHD by using the Disk Management tools. You create a VHD and then apply a Windows image from a .wim file to a partition in the VHD. After you complete the steps in this section, you can configure the VHD for native boot or configure it to boot in a virtual machine by following the instructions in Preparing Virtual Hard Disks for Boot.

How to Create Windows 8 VHD for Boot to VHD using simple, easy to follow steps

Once I make a backup copy of the VHD file for future use, I will go ahead and Mount the VHD again to add that installation to the boot menu. To do this, I will right click Disk Management and select Attach VHD. The Attach VHD Wizard will start. I can either browse to the VHD or just type it in the Location field.

The VHD will be mounted and will be assigned a drive letter by the system. In my case, it is drive F: again.

Go back to the Administrative Command Prompt and type the following command to add the installation to the Boot Menu:

bcdboot F:\windows

Once the command finishes, you will now have the new Windows 8 entry in your boot menu.

Question No: 35 DRAG DROP – (Topic 1)

A company has client computers that run Windows 8.1. All client computers allow incoming Remote Desktop connections.

You attempt to connect from COMPUTER1 to COMPUTER2 by using Remote Desktop.

Remote Desktop cannot connect to the remote computer. You establish that the firewall settings on COMPUTER2 have not been set to allow incoming connections.

From COMPUTER1, you need to enable Remote Desktop traffic through Windows Firewall on COMPUTER2.

Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec#39;s most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems.

The Netsh commands for Windows Firewall provide a command-line alternative to the capabilities of the Windows Firewall Control Panel utility. By using the Netsh firewall commands, you can configure and view Windows Firewall exceptions and configuration settings.

Netsh firewall

The following sections describe each command and its syntax. set service

Required. Specifies the service whose pre-defined rules are enabled or disabled. The value must be one of the following:

fileandprint. The file and printer sharing service.

remoteadmin. The ability to remotely administer a computer running Windows. remotedesktop. The ability to use a Terminal Services client such as Remote Desktop. upnp. Universal Plug-and-Play protocol for networked devices.

all. All of the above services.

[ [ mode = ] { enable | disable } ]

Specifies whether this exception is currently applied and active on the local computer. The default value is enable.

Prevents Windows from being able to store a Windows Connect Now configuration to a UFD. Because the Windows Connect Now information stored on a UFD contains information that can allow computers to access your protected wireless network, you might choose to disable this setting to improve the security of your wireless networks.

http://windows.microsoft.com/en-US/windows-vista/What-is-Windows-Connect-Now What is Windows Connect Now?

Microsoft Windows Connect Now (WCN) is a technology designed to address the need for a simple and more secure way to configure network devices and computers. In addition to easier device configuration, you can use WCN to save wireless network settings to a USB flash drive and then plug that drive into devices (such as routers) and computers so you can quickly and easily add them to a network.

DirectAccess overcomes the limitations of VPNs by automatically establishing a bi- directional connection from client computers to the corporate network. DirectAccess is built on a foundation of proven, standards-based technologies: Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).

A few Windows 8 functions only work with IPv6 such as DirectAccess and HomeGroup.

Question No: 38 – (Topic 1)

A company has client computers that run Windows 8.1. File History is on. An employee downloads data to a folder on drive D named Archives.

You need to ensure that the user can restore files from the Archives folder by using File History.

What should you do?

Configure the File History advanced settings to include the Archives folder.

From the File History configuration options, change the drive and select the Archives folder.

Create a library named History and add the Archives folder to the library.

Move the Archives folder into the Windows system folder.

Answer: C Explanation:

http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx What is File History?

File History is a backup application that continuously protects your personal files stored in Libraries, Desktop, Favorites, and Contacts folders. It periodically (by default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.

File History is a new feature in Windows 8 that helps to ensure that your personal files are safe. In addition to being a backup solution, File History also provides the capability to restore multiple backup copies (versions) of your files. File history in Windows 8 is easy to setup, powerful, and reliable. This means you can have more confidence when working with files, and also keep less redundant copies around for your own personal “data history”. You can easily configure File History to protect some or all of the files that are in your libraries on Windows 8. You can add folders to your libraries easily in Windows 8, giving you the ability to use File History with any group of folders and files that you choose.

Question No: 39 DRAG DROP – (Topic 1)

A company has a branch office with client computers that run Windows 8.1. Files are saved locally on the client computers and are not backed up regularly.

You need to ensure that you can retrieve previous versions of locally saved files from each client computer.

Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

http://blogs.msdn.com/b/b8/archive/2012/07/10/protecting-user-files-with-file-history.aspx What is File History?

File History is a backup application that continuously protects your personal files stored in Libraries, Desktop, Favorites, and Contacts folders. It periodically (by default every hour) scans the file system for changes and copies changed files to another location. Every time any of your personal files has changed, its copy will be stored on a dedicated, external storage device selected by you. Over time, File History builds a complete history of changes made to any personal file.

Requirements

File History requires:

Windows 8 Client operating system

An external storage device with enough storage capacity to store a copy of all user libraries, such as a USB drive, Network Attached Storage device, or share on another PC in the home network.